Analysis
-
max time kernel
125s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 15:09
Behavioral task
behavioral1
Sample
stub.exe
Resource
win10v2004-20240508-en
General
-
Target
stub.exe
-
Size
1.6MB
-
MD5
49ee25afe2ad0180077064793fadf22e
-
SHA1
74e760041f9f2359ddad1d2d89f86c3052bedc9f
-
SHA256
d909f5519de499c7329a54e007ec94cf45d304e9fb17daaf7ee3cdf43675691c
-
SHA512
f17edd410d1af94fcff5bf782ae24a83d1978e3ed45145da99a76a3b326fdc85f3b4969e98b569e631d17f51e67ec688c5b5abf755c4af7fe190976f847c521b
-
SSDEEP
24576:1di2Q9NXw2/wPOjdGxY2rqkqjVnlqud+/2P+A+ZecdyFoBkkAnexMrdgLnF:1UTq24GjdGSiqkqXfd+/9AqYanieKd
Malware Config
Signatures
-
Stealerium
An open source info stealer written in C# first seen in May 2022.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation stub.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 discord.com 22 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4680 timeout.exe -
Kills process with taskkill 1 IoCs
pid Process 2020 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 stub.exe 2616 stub.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2616 stub.exe Token: SeDebugPrivilege 2020 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1804 2616 stub.exe 99 PID 2616 wrote to memory of 1804 2616 stub.exe 99 PID 2616 wrote to memory of 1804 2616 stub.exe 99 PID 1804 wrote to memory of 3396 1804 cmd.exe 101 PID 1804 wrote to memory of 3396 1804 cmd.exe 101 PID 1804 wrote to memory of 3396 1804 cmd.exe 101 PID 1804 wrote to memory of 2020 1804 cmd.exe 102 PID 1804 wrote to memory of 2020 1804 cmd.exe 102 PID 1804 wrote to memory of 2020 1804 cmd.exe 102 PID 1804 wrote to memory of 4680 1804 cmd.exe 103 PID 1804 wrote to memory of 4680 1804 cmd.exe 103 PID 1804 wrote to memory of 4680 1804 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\stub.exe"C:\Users\Admin\AppData\Local\Temp\stub.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1D37.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:3396
-
-
C:\Windows\SysWOW64\taskkill.exeTaskKill /F /IM 26163⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\timeout.exeTimeout /T 2 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4680
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4200,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4004 /prefetch:81⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57B
MD5083c6fdce55536ba4f3165735e306729
SHA1c428d7903394f51523d31e0cd453e2373e7a8caf
SHA256c4453f0f4828ef4ff94cca8a2c50f6453db50e7c3b6477d13db03cc689aa2ef8
SHA5123fb8f1b3181448c34b16cca85f70b56cd91a0592d7e92e373597872d47ec3226adef0841df8cc4342c67d74d00dc6737294769899f8f91e5827db8009d0d869f